A Tabu Search algorithm for the optimisation of telecommunication networks 蔣雅慈.

Slides:



Advertisements
Similar presentations
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Advertisements

Novembro 2003 Tabu search heuristic for partition coloring1/29 XXXV SBPO XXXV SBPO Natal, 4-7 de novembro de 2003 A Tabu Search Heuristic for Partition.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Optical Networks BM-UC Davis122 Part III Wide-Area (Wavelength-Routed) Optical Networks – 1.Virtual Topology Design 2.Wavelength Conversion 3.Control and.
Progress in Linear Programming Based Branch-and-Bound Algorithms
Data Structures Using C++
Edited by Malak Abdullah Jordan University of Science and Technology Data Structures Using C++ 2E Chapter 12 Graphs.
The Out of Kilter Algorithm in Introduction The out of kilter algorithm is an example of a primal-dual algorithm. It works on both the primal.
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
MAE 552 – Heuristic Optimization Lecture 24 March 20, 2002 Topic: Tabu Search.
Recent Development on Elimination Ordering Group 1.
University of CreteCS4831 The use of Minimum Spanning Trees in microarray expression data Gkirtzou Ekaterini.
A new crossover technique in Genetic Programming Janet Clegg Intelligent Systems Group Electronics Department.
Chapter 9: Greedy Algorithms The Design and Analysis of Algorithms.
Hierarchical Constraint Satisfaction in Spatial Database Dimitris Papadias, Panos Kalnis And Nikos Mamoulis.
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
MAE 552 – Heuristic Optimization
2-Layer Crossing Minimisation Johan van Rooij. Overview Problem definitions NP-Hardness proof Heuristics & Performance Practical Computation One layer:
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.
DAST, Spring © L. Joskowicz 1 Data Structures – LECTURE 1 Introduction Motivation: algorithms and abstract data types Easy problems, hard problems.
Important Problem Types and Fundamental Data Structures
Instructor: Dr. Sahar Shabanah Fall Lectures ST, 9:30 pm-11:00 pm Text book: M. T. Goodrich and R. Tamassia, “Data Structures and Algorithms in.
Internet Traffic Policies and Routing Vic Grout Centre for Applied Internet Research (CAIR) University of Wales NEWI Plas Coch Campus, Mold Road Wrexham,
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
Data Structures Using C++ 2E
Genetic Algorithms and Ant Colony Optimisation
Network Optimization Models
CAFE router: A Fast Connectivity Aware Multiple Nets Routing Algorithm for Routing Grid with Obstacles Y. Kohira and A. Takahashi School of Computer Science.
Network Aware Resource Allocation in Distributed Clouds.
CSCE350 Algorithms and Data Structure Lecture 17 Jianjun Hu Department of Computer Science and Engineering University of South Carolina
Tabu Search UW Spring 2005 INDE 516 Project 2 Lei Li, HongRui Liu, Roberto Lu.
Zorica Stanimirović Faculty of Mathematics, University of Belgrade
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
Télécom 2A – Algo Complexity (1) Time Complexity and the divide and conquer strategy Or : how to measure algorithm run-time And : design efficient algorithms.
1 Optical Packet Switching Techniques Walter Picco MS Thesis Defense December 2001 Fabio Neri, Marco Ajmone Marsan Telecommunication Networks Group
The Colorful Traveling Salesman Problem Yupei Xiong, Goldman, Sachs & Co. Bruce Golden, University of Maryland Edward Wasil, American University Presented.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
CAS 721 Course Project Implementing Branch and Bound, and Tabu search for combinatorial computing problem By Ho Fai Ko ( )
G5BAIM Artificial Intelligence Methods
1 Network Models Transportation Problem (TP) Distributing any commodity from any group of supply centers, called sources, to any group of receiving.
CS270 Project Overview Maximum Planar Subgraph Danyel Fisher Jason Hong Greg Lawrence Jimmy Lin.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Pipelined and Parallel Computing Partition for 1 Hongtao Du AICIP Research Nov 3, 2005.
Ricochet Robots Mitch Powell Daniel Tilgner. Abstract Ricochet robots is a board game created in Germany in A player is given 30 seconds to find.
Routing Topology Algorithms Mustafa Ozdal 1. Introduction How to connect nets with multiple terminals? Net topologies needed before point-to-point routing.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
The Ant System Optimization by a colony of cooperating agents.
Sporadic model building for efficiency enhancement of the hierarchical BOA Genetic Programming and Evolvable Machines (2008) 9: Martin Pelikan, Kumara.
1 Chapter 2 Notation and Definitions Data Structures Transformations.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Chapter 20: Graphs. Objectives In this chapter, you will: – Learn about graphs – Become familiar with the basic terminology of graph theory – Discover.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 14, 2014.
BITS Pilani Pilani Campus Data Structure and Algorithms Design Dr. Maheswari Karthikeyan Lecture1.
Constraint Programming for the Diameter Constrained Minimum Spanning Tree Problem Thiago F. Noronha Celso C. Ribeiro Andréa C. Santos.
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
Confidential & Proprietary – All Rights Reserved Internal Distribution, October Quality of Service in Multimedia Distribution G. Calinescu (Illinois.
Greedy Technique.
Courtsey & Copyright: DESIGN AND ANALYSIS OF ALGORITHMS Courtsey & Copyright:
Subject Name: Operation Research Subject Code: 10CS661 Prepared By:Mrs
Study Guide for ES205 Yu-Chi Ho Jonathan T. Lee Nov. 7, 2000
MATS Quantitative Methods Dr Huw Owens
Introduction Basic formulations Applications
Graph Operations And Representation
Subset of Slides from Lei Li, HongRui Liu, Roberto Lu
Chapter 6 Network Flow Models.
Md. Tanveer Anwar University of Arkansas
Presentation transcript:

A Tabu Search algorithm for the optimisation of telecommunication networks 蔣雅慈

Introduction A single exchange (or single hub) network may lead to inefficiencies. [Luby & Dziatkjewicz, 1989], [Moondra, 1989] The exchange can be duplicated.

Introduction (con.) A suitable model of the overall structure will be provided by connecting a single exchange and a number of multiplexing centers and connecting to it all the users. The major planning problem is to connect all the users to the exchange through a tree multiplexer network having an optimised overall cost.

Return Return tran.

Introduction (con.) Many combinatorial optimisation problems fall into the class of the NP-complete problems. [Garey & Johnson 1979] Optimisation techniques based on linear programming. (Linear does not accurately represent the effective cost of the actual network). Heuristic algorithms yield satisfactory results.

Introduction (con.) “add and drop” techniques. [Boorstin & Frank, 1977], [Gerla & Kleinrock, 1977], [McGregor & Shen, 1977], [Costamagna, 1997], in this paper we refer to it as HAD. HAD algorithm was compared with branch and bound technique. [Costamagna et al., 1990] Recently, natural algorithms (GA [Celli et al., 1995], SA [Costamagna et al., 1995]) have been implemented. In this paper a TS algorithm is discussed.

Problem definition and formulation The function to be minimised represents the overall cost of the network, the sum of four components: 1. the cost of the distribution network. 2. the cost of the multiplexing centers. 3. the cost of the transport network. 4. the cost of multiplexer/demultiplexer equipment located in the exchange. graph

The cost of the distribution network The sum of the costs of the links which connect all the users to the closest multiplexing center, and of the costs of the users’ terminals. notation Nnumber of users NNnumber of feasible locations of multiplexing centers CF10cost of the fiber-optic cable DN*N matrix, d ij, shortest path between ith and jth nodes YN*NN incidence matrix of the distribution network, y ij = 1 if the ith user is connected to the jth multiplexing center

The cost of the distribution network notation FC i integer number corresponding to the hierarchical level of the capacity demand of nay user CUT(FC i )Cost of the equipment of the ith node, depending on capacity level FC i value Capacity [Mbit/s]

The cost of multiplexing centers notation kcapacity hierarchy index CM(k)cost of the multiplexer with input capacity at hierarchy level k S(k)integer variable used to compute the number of multiplexers needed, at input hierarchy level k: S(k) = 16 if k = 1 and S(k) = 4 if k = 2, 3, 4 N kj Number of connections at input hierarchy level k connected to the jth multiplexing center xjxj Activation index, showing if the jth multiplexing center has been activated (x j = 1 ) not ( x j = 0 )

The cost of multiplexing centers (con.) The overall cost of the jth multiplexing center CMP j :

The cost of the transport network The sum of the costs of the cables connecting the multiplexing centers to the exchange. notation CF50cost of the fiber optic cable used to build the transport network ZNN*NN incidence matrix representing the transport network: z ij = 1 if he ith multiplexing center is connected to the jth one CTL(k)cost of the line terminal of hierarchy k FT j capacity hierarchy level of output flow of the jth multiplexing center

The cost of demultiplexers notation CDMPX k Cost of multiplexing /demultiplexing equipment with hierarchy level equal to k in the exchange N kj Number of fibers at hierarchy level k connecting the jth multiplexing center and the exchange

Problem and constraints

Tabu Search A configuration of the network is a binary string, whose size equals the number of feasible locations of multiplexing centers. In TS methods (the problem is the binary string), a simple move: the change of one bit at a time. This allows speeding up the execution of each iteration of the TS algorithm.

The variation of the network The initial solution is a star configuration: all the users are directly connected to the exchange with a minimum spanning tree. The binary string has zeroes everywhere, except in the bit corresponding to the location of the exchange, which equals 1. At each step, add or drop one multiplexing center to the previous configuration.

The distribution network Each user must be connected to the closest multiplexing center. If a multiplexing center is dropped:

Transport network notation distThe matrix containing the minimum distances among the nodes transThe array in which distances from one multiplexing center to the preceding in the transport network are stored. graph

Multiplation/demultiplation The equipment in each center is different from that used in the previous solution and must be re-designed. For each activated center, the record of the cost, the number and type of the equipment, the input flows and the number of fiber-optic cables in output are needed.

Cost variation The variation of the cost of the distribution network The variation of the cost of the transport network The variation of multiplexing and demultiplexing cost The saving in computational time increases according to the growth in size of the network.

TS algorithm Two kinds of memory, implemented were Short term memory and Long term memory. The “aspiration criterion” is also made which allows us to override tabu status if that move is still found to lead to a better cost of the optimum.

The choice of parameters An extensive testing involving some networks of different sizes. The implementation of the described algorithm has been proven to be very fast. [Celli & Costamagna, 1995], [Costamagna, 1997], [Costamagna et al., 1995] The algorithm run iterations for each trial.

Short term memory Smaller values of tabu_tenure cannot prevent cycling. Larger values could forbid useful moves. Using a dynamically varying tabu_tenure has been tried. [Glover et al., 1993]

Long term memory Transition frequencies and residence frequencies has been implemented. [Glover, 1994] Many tests showed a better performance of the algorithm when absolute value of the transition frequencies has been used.

Results Compared with HAD, GA, SA Two types of graph topology: random and geometrical graphs with small (about 50 nodes), medium (about 100 nodes), large size (about 150 nodes) For each sample network the maximum number of iterations allowed for the TS algorithm has been put to 10000, but very often, optimality has been found after a lower number of iterations.

Fig. 2

Considerations on sample networks If the TS algorithm was forced to use only the computational time needed by HAD, the configuration found by TS was better than the HAD one.

Two types of graph topology have been considered: random and geometrical graphs. The graph topology defined in terms of two parameters: random graphsnumber of verticesthe probability that a given pair of vertices constitute an edge geometrical graphs number of nodesa reference distance d

Fig. 3(random) Fig. 4(geometrical)

Considerations on sample networks (Regarding small size networks) In almost all cases when TS was stopped after the computational time needed by HAD, the optimal configuration found had a lower cost than the HAD one. This is due to two reasons: 1. the behavior of TS during the first iterations, very similar to HAD strategies of “add and drop”. 2. the higher speed of the cost computation algorithm used in TS.

Considerations on sample networks (Regarding medium and large size random graphs) Medium size: For a net work with 96 nodes the configuration found by TS has a cost 0.51% lower than SA’s, and 0.06% lower for a 100 node network. Large size: 1. The random graphs TS performed better. 2. Very often TS was able to find better configurations than HAD and SA when stopped after their computational time.

Considerations on sample networks (geometric graphs) Convergence is faster. TS improved best solutions for geometric graphs in all but one case(105 node network)

Conclusion Computation times required by the TS method developed are on the average somewhat less than those required by the SA. GA and SA methods required a large number of trials on a single problem with the same parameters setting.